Certified Ethical Hacker (CEH) : Malware Threats

0
779

Malware Propagation ways

Free Software

File Sharing Services

Removable Media

Email Communication

Not using Firewall and Anti-Virus

Trojan Concept

Trojan Infection Process

Trojan Construction Kit

Droppers

Wrappers

Crypter

Deployment of Trojan

Types of Trojans

  • Command Shell Trojans
  • Defacement Trojans
  • HTTP/HTTPS Trojans
  • Botnet Trojans
  • Proxy Server Trojans
  • Remote Access Trojans (RAT)

Trojan Countermeasures

Detection Techniques for Trojans

Virus and Worms Concepts

Viruses

Stages of Virus Life

  • Design
  • Replication
  • Launch
  • Detection
  • Incorporation
  • Elimination

Working of Viruses

  • Infection Phase
  • Attack Phase

Ransomware

Types of Viruses

  • System or Boot Sector Viruses
  • File and Multipartite Viruses
  • Macro Viruses
  • Cluster Viruses
  • Stealth/Tunneling Viruses
  • Logic Bombs
  • Encryption Virus
  • Metamorphic Viruses
  • File Overwriting or Cavity Viruses
  • Sparse Infector Viruses
  • Companion/Camouflage Viruses
  • Shell Viruses
  • File Extension Viruses
  • Add-on and Intrusive Viruses
  • Transient and Terminate and Stay Resident Viruses

Writing a Simple Virus Program

Virus Generating Tools

Computer Worms

Virus Analysis and Detection Methods

Malware Reverse Engineering

Sheep Dipping

Malware Analysis

Goals of Malware Analysis

Types of Malware Analysis

  • Static Analysis
  • Dynamic Analysis

LEAVE A REPLY

Please enter your comment!
Please enter your name here